首页> 外文会议>Progress in cryptology - INDOCRYPT 2009 >Efficient Constructions of Signcryption Schemes and Signcryption Composability
【24h】

Efficient Constructions of Signcryption Schemes and Signcryption Composability

机译:高效的签密方案构造和签密组合性

获取原文
获取原文并翻译 | 示例

摘要

In this paper, we investigate simple but efficient constructions of signcryption schemes. Firstly, we show how symmetric primitives can be used to efficiently achieve outsider multi-user security, leading to a signcryption scheme with the currently lowest ciphertext and computational overhead. For the mixed security notions outsider confidentiality/insider unforgeability and insider confidentiality/outsider un-forgeability, this approach yields lower ciphertext overhead and a higher level of security, respectively, compared to the current schemes. Secondly, we show a simple optimization to the well known "sign-then-encrypt" and "encrypt-then-sign" approaches to the construction of signcryption schemes by using tag-based encryption. Instantiations with our proposed tag-based schemes yield multi-user insider secure signcryption schemes in the random oracle model which is at least as efficient as any other existing scheme both in terms of ciphertext overhead and computational cost. Furthermore, we show that very efficient standard model signcryption schemes can be constructed using this technique as well. Lastly, we show how signatures and encryption can be combined in a non-black-box manner to achieve higher efficiency than schemes based on the above approach. We refer to signature and encryption schemes which can be combined in this way as signcryption composable, and we show that a number of the most efficient standard model encryption and signature schemes satisfy this, leading to the most efficient standard model signcryption schemes. Since all of our constructions are fairly simple and efficient, they provide a benchmark which can be used to evaluate future signcryption schemes.
机译:在本文中,我们研究了简单但有效的签密方案的构造。首先,我们展示如何使用对称原语有效地实现外部多用户安全性,从而导致具有目前最低密文和计算开销的签密方案。对于混合安全性概念,外部机密/内部不可伪造和内部机密/外部不可伪造,与当前方案相比,此方法分别产生较低的密文开销和较高的安全级别。其次,我们展示了对众所周知的“先签名后加密”和“先签名后加密”方法的简单优化,以通过使用基于标签的加密来构建签密方案。用我们提出的基于标签的方案实例化会在随机预言模型中产生多用户内部安全签名方案,这在密文开销和计算成本方面至少与任何其他现有方案一样有效。此外,我们证明了使用此技术也可以构建非常有效的标准模型签密方案。最后,我们展示了如何以非黑盒的方式组合签名和加密,以实现比基于上述方法的方案更高的效率。我们将可以通过这种方式组合在一起的签名和加密方案称为可组合的签密,并且我们证明许多最有效的标准模型加密和签名方案都可以满足此要求,从而导致了最有效的标准模型签密方案。由于我们所有的结构都相当简单和高效,因此它们提供了一个基准,可用于评估未来的签密方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号